Blog

Category: Privacy

Data Tokenization and Masking with Baffle in Amazon Redshift

Security and compliance for sensitive data in your cloud data pipeline and warehouse while running data analysis.

Announcing Baffle Real Queryable Encryption (Advanced Encryption)

Baffle Advanced Encryption is the easiest fastest, and most flexible way to analyze your regulated data while meeting compliance requirements

US and EU Flags

The Updated EU-US Data Privacy Framework: Enhancing Trans-Atlantic Data Privacy

The new Trans-Atlantic Data Privacy Framework will bring about an unprecedented change in how data privacy is regulated and safeguarded. In this post we discuss its significance and how Baffle Data Protection addresses its key aspects.

Red and blue padlock icons with binary text

Advantages and Disadvantages of Homomorphic Encryption 2023

Four years after our first blog on homomorphic encryption, we revisit the technology to see what’s changed to make it viable for enterprises. The short answer: not much.

Is data masking the same as data encryption?

Data masking and data encryption are two important data security techniques that can help you protect sensitive data and meet compliance . While not always…

Data Encryption Checklist for Enterprises

Enterprise considerations for implementing data encryption

Organizations are accelerating plans for data encryption, driven by increased security, privacy, and cloud workload protection requirements. However, there are a few different approaches to…

Data Masking

Static Data Masking versus Dynamic Data Masking

Wondering which type of masking is best for your data? In this blog post, we discuss the differences and which use cases best suit each type of masking.

Scrabble TDE

Transparent Data Encryption is Not Enough

Security for an earlier time One of the biggest challenges with security is understanding the threats and how to properly defend against them. Just because…

Encrypted keys

Data Encryption Methods and their Advantages and Disadvantages

Protecting data has become a critical part of every organization’s operation. However, choosing the best method of data encryption can be difficult with all the…